Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Queston 1 : Data network and SecurityQueston 1 : Data network and Security QUESTION 1 [40 MARKS] (a) Universiti Malaysia Pahang (UMP) has been using

Queston 1 : Data network and SecurityQueston 1 : Data network and Security

image text in transcribed

image text in transcribed

QUESTION 1 [40 MARKS] (a) Universiti Malaysia Pahang (UMP) has been using their own website with several efficient internal systems to provide better education for students. Some of the services that has been provided by UMP to their students and staff are internet connection, email, Kalam portal, e-Community portal which can be accessed inside and outside the university premises, and wi-fi connection. Based on the given information, identify TWO (2) possible vectors that can be used to attack the UMP network. 14 Marks (b) The key is 41837526. The default filling letters of the table are ......X Y Z. Using the given details, encrypt the message, your time is limited, finish it quickly without consulting book," by using double transposition cipher method. Explain all the steps involved [16 Marks (C) Darius is a crime investigator in CRI secret agency. Now he is appointed to investigate a murder case in Mount Kinabalu. So he is staying in the hotel and uses the hotel Wi- Fi services to communicate with the agency. He has gathered some important evidences regarding the case. Suddenly, he sensed that he has been spied by someone (the spy might belong to murderer group). Now, Darius want to convey this spying matter to his agency. Darius thought, using phone calls might be insecure, so he wanted to use email for communication. Since he is communicating over unsecured channel, he has decided to encrypt his message using some key. Darius and the Agency will share the key in such a way that the spy cannot obtain the key. So, they agreed on using two publicly known numbers. But, now they have a confusion to choose the correct algorithm to proceed. Now, please help them to solve the situation. [16 Marks) (C) Darius is a crime investigator in CRI secret agency. Now he is appointed to investigate a murder case in Mount Kinabalu. So he is staying in the hotel and uses the hotel Wi- Fi services to communicate with the agency. He has gathered some important evidences regarding the case. Suddenly, he sensed that he has been spied by someone (the spy might belong to murderer group). Now, Darius want to convey this spying matter to his agency. Darius thought, using phone calls might be insecure, so he wanted to use email for communication. Since he is communicating over unsecured channel, he has decided to encrypt his message using some key. Darius and the Agency will share the key in such a way that the spy cannot obtain the key. So, they agreed on using two publicly known numbers. But, now they have a confusion to choose the correct algorithm to proceed. Now, please help them to solve the situation. i. Based on the given information, suggest a suitable algorithm for them to proceed and justify your answer. [4 Marks ii. Darius has used some asymmetric encryption technique to encrypt his message and the cipher message that has reached the agency is, C=8. Identify the asymmetric encryption used by Darius. Derive the original message if he has used the public key, e=13, and n=77. All the mathematical calculations involved in each step should be shown. [16 Marks

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Securing SQL Server Protecting Your Database From Attackers

Authors: Denny Cherry

1st Edition

1597496251, 978-1597496254

More Books

Students also viewed these Databases questions

Question

2. Identify and choose outcomes to evaluate a training program.

Answered: 1 week ago

Question

6. Conduct a cost-benefit analysis for a training program.

Answered: 1 week ago